Table 64: Configuring General Host Checker Remediation
Details
(continued)
Your Action
Function
Option
Select the
Kill Processes
option to
enable this feature, and then enter
the name. For example, enter
keylogger.exe
Specifies the name of one or more
processes you want to kill if the user’s
computer does not meet the policy
requirements. You can include an optional
MD5 checksum for the process.
Kill
Processes
Select the
Delete Files
option to
enable this feature, and then enter
the filename. For example, enter
c:\temp\bad-file.txt
/temp/bad-file.txt
.
Specifies the names of files you want to
delete if the user’s computer does not meet
the policy requirements. Enter one filename
per line.
Delete Files
Select the
Send reason strings
option to enable this feature.
Displays a message to users (called a
reason string) that is returned by Host
Checker or integrity measurement verifier
(IMV) and explains why the client machine
does not meet the Host Checker policy
requirements.
NOTE: This option applies to predefined
rules, custom rules, and to third-party IMVs
that use extensions in the Juniper Networks
TNC SDK.
Send
reason
strings
Related
Documentation
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM
Procedure) on page 234
•
•
Configuring the Remote Integrity Measurement Verifier Server (NSM Procedure) on
page 240
•
Setting Up Secure Access Device Host Checker Options (NSM Procedure) on page 231
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM
Procedure)
Host Checker comes pre-equipped with a vast array of predefined rules that check for
antivirus software, firewalls, malware, spyware, and specific operating systems from a
wide variety of industry leaders. You can enable one or more of these rules within a Host
Checker client-side policy to ensure that the integrated third-party applications that you
specify are running on your users’ computers in accordance with your specifications. For
firewall and antivirus rules, you can specify remediation actions to automatically bring
the endpoint into compliance.
To configure third-party applications using predefined rules:
1.
In the navigation tree, select
Device Manager
>
Devices
.
2.
Click the
Device Tree
tab, and then double-click the Secure Access device for which
you want to configure Host Checker third-party applications using predefined rules.
Copyright © 2010, Juniper Networks, Inc.
234
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...